ITU-T K.81 - Estimation examples of the high-power electromagnetic threat and vulnerability for telecommunication systems |
|
When information security is managed, it is necessary to evaluate and mitigate the threat to either the equipment or the site. This threat is related to "vulnerability" and "confidentiality" in Information Security Management System (ISMS).
Supplement 5 to ITU-T K-series Recommendations (ITU-T K.81) presents evaluation and calculation examples for the threat of an intentional HPEM attack. The HPEM sources considered are those presented in IEC 61000-2-13, as well as some additional sources that have emerged more recently.
This document also provides information on the vulnerability of telecom equipment. And the example of vulnerability is provided. The equipment is desirable to meet the immunity requirements presented in Recommendation ITU-T K.48 and relevant resistibility requirements, such as those described in Recommendations ITU-T K.20, ITU-T K.21 and ITU-T K.45.
|
|
|
|
Title |
Approved on |
Download |
Mitigation measures for telecommunication installations – Chapter 10
|
2006
|
here
|
Mitigation measures for telecommunication installations
|
2004
|
here
|
Earthing and bonding
|
2003
|
here
|
Guide to the use of ITU-T Publications produced by Study Group 5 aimed at achieving Electromagnetic Compatibility and Safety
|
2002
|
here
|
Earthing of telecommunication installations
|
1976
|
here
|
|